Method of data-efficient threat detection in a computer network
GB201908462D0
False alarm detection for malware scanning
GB201907310D0
Method for integrity protection in a computer network
GB201907200D0
Network security
GB201906770D0
Network vulnerability detection
GB201906412D0
Method for inspection and filtering of TCP streams in gateway router
GB201905409D0
Hole punching abuse
GB201902145D0
Spam detection
GB201901942D0
Device safety notification method and system
GB201818551D0
Threat control method and system
GB201810894D0
Method for data reduction in a computer network security system
GB201810705D0
Method for threat control in a computer network security system
GB201808757D0
Controlling Threats on a Computer System by Searching for Matching Events on other Endpoints
GB201805756D0
Detecting shared library hijacking
GB201804396D0
Threat detection system
GB201804421D0
Using a generated list of expected and prohibited events of a cluster that represents applications associated therewith for application behaviour monitoring
GB201721375D0
Method of detecting malware in a sandbox environment
GB201721378D0
Threat detection system
GB201720660D0
Probing and responding to computer network security breaches